UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The FA will ensure the firewall will not utilize any services or capabilities other than firewall software (e.g., DNS servers, e-mail client servers, ftp servers, web servers, etc.), and if these services are part of the standard firewall suite, they will be either uninstalled or disabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-3054 NET0377 SV-3054r1_rule ECSC-1 Medium
Description
The additional services that the firewall has enabled increases the risk for an attack since the firewall will listen for these services. In addition, these services provide an unsecured method for an attacker to gain access to the router.
STIG Date
Firewall Security Technical Implementation Guide 2013-10-08

Details

Check Text ( C-3672r1_chk )
Have the FA display the services running on the firewall appliance or underlying OS.CAVEAT: Anti-virus software running on the firewall's OS would be an exception to the above requirement. In fact, it is recommended that anti-virus software be implemented on any non-appliance firewall if supported. However, it is not a finding if anti-virus software has not been implemented.
Fix Text (F-3079r1_fix)
The Firewall Administrator will only utilize services related to the operation of the firewall and even if they are part of the firewall standard suite, they will be uninstalled or disabled.